Security flaws in Apple’s Face ID are already being reported—masks being used to unlock phones and the inability to distinguish between close blood relatives. I don’t think this has surprised anyone involved in IT security. Last week a wife discovered her husband had been cheating on her after she unlocked his phone using his fingerprint […]
Scott Adams being depressingly insightful on project planning.
Karl Broman and Kara Woo offer some good advice on organizing data in spreadsheets. They advocate confining the use of spreadsheets to data entry and storage—moving calculations and visualizations to other tools. This certainly avoids some of the biggest problems with using spreadsheets. However, spreadsheets don’t enforce any discipline. It’s up to the user to […]
As part of National Cyber Security Awareness Month Learning Tree have re-purposed two of my security-related articles—one as an info-article and the other as an infographic. The info-article is on the problems with biometric security and the infographic is a summary of ten Internet of Things (IoT) vulnerabilities. The original biometric security and IoT vulnerabilities […]
Trust seems to be a rare commodity these days. Game theory helps us understand how distrust grows within a society and—encouragingly—suggest ways in which we might stop the rot. Nicky Case has brought this dry subject matter to life via a wonderful interactive description of how (dis)trust evolves. It’s about 30 minutes long. Just play […]